#include #include #include #include #include #include #include #include #include "sepolicy.hpp" #define SHALEN 64 static bool cmp_sha256(const char *a, const char *b) { char id_a[SHALEN] = {0}; char id_b[SHALEN] = {0}; if (int fd = xopen(a, O_RDONLY | O_CLOEXEC); fd >= 0) { xread(fd, id_a, SHALEN); close(fd); } else { return false; } if (int fd = xopen(b, O_RDONLY | O_CLOEXEC); fd >= 0) { xread(fd, id_b, SHALEN); close(fd); } else { return false; } LOGD("%s=[%.*s]\n", a, SHALEN, id_a); LOGD("%s=[%.*s]\n", b, SHALEN, id_b); return memcmp(id_a, id_b, SHALEN) == 0; } static bool check_precompiled(const char *precompiled) { bool ok = false; const char *actual_sha; char compiled_sha[128]; actual_sha = PLAT_POLICY_DIR "plat_and_mapping_sepolicy.cil.sha256"; if (access(actual_sha, R_OK) == 0) { ok = true; sprintf(compiled_sha, "%s.plat_and_mapping.sha256", precompiled); if (!cmp_sha256(actual_sha, compiled_sha)) return false; } actual_sha = PLAT_POLICY_DIR "plat_sepolicy_and_mapping.sha256"; if (access(actual_sha, R_OK) == 0) { ok = true; sprintf(compiled_sha, "%s.plat_sepolicy_and_mapping.sha256", precompiled); if (!cmp_sha256(actual_sha, compiled_sha)) return false; } actual_sha = PROD_POLICY_DIR "product_sepolicy_and_mapping.sha256"; if (access(actual_sha, R_OK) == 0) { ok = true; sprintf(compiled_sha, "%s.product_sepolicy_and_mapping.sha256", precompiled); if (!cmp_sha256(actual_sha, compiled_sha) != 0) return false; } actual_sha = SYSEXT_POLICY_DIR "system_ext_sepolicy_and_mapping.sha256"; if (access(actual_sha, R_OK) == 0) { ok = true; sprintf(compiled_sha, "%s.system_ext_sepolicy_and_mapping.sha256", precompiled); if (!cmp_sha256(actual_sha, compiled_sha) != 0) return false; } return ok; } static void load_cil(struct cil_db *db, const char *file) { auto d = mmap_data(file); cil_add_file(db, (char *) file, (char *) d.buf, d.sz); LOGD("cil_add [%s]\n", file); } sepolicy *sepolicy::from_file(const char *file) { LOGD("Load policy from: %s\n", file); policy_file_t pf; policy_file_init(&pf); auto fp = xopen_file(file, "re"); pf.fp = fp.get(); pf.type = PF_USE_STDIO; auto db = static_cast(xmalloc(sizeof(policydb_t))); if (policydb_init(db) || policydb_read(db, &pf, 0)) { LOGE("Fail to load policy from %s\n", file); free(db); return nullptr; } auto sepol = new sepolicy(); sepol->db = db; return sepol; } sepolicy *sepolicy::compile_split() { char path[128], plat_ver[10]; cil_db_t *db = nullptr; sepol_policydb_t *pdb = nullptr; FILE *f; int policy_ver; const char *cil_file; cil_db_init(&db); run_finally fin([db_ptr = &db]{ cil_db_destroy(db_ptr); }); cil_set_mls(db, 1); cil_set_multiple_decls(db, 1); cil_set_disable_neverallow(db, 1); cil_set_target_platform(db, SEPOL_TARGET_SELINUX); cil_set_attrs_expand_generated(db, 0); f = xfopen(SELINUX_VERSION, "re"); fscanf(f, "%d", &policy_ver); fclose(f); cil_set_policy_version(db, policy_ver); // Get mapping version f = xfopen(VEND_POLICY_DIR "plat_sepolicy_vers.txt", "re"); fscanf(f, "%s", plat_ver); fclose(f); // plat load_cil(db, SPLIT_PLAT_CIL); sprintf(path, PLAT_POLICY_DIR "mapping/%s.cil", plat_ver); load_cil(db, path); sprintf(path, PLAT_POLICY_DIR "mapping/%s.compat.cil", plat_ver); if (access(path, R_OK) == 0) load_cil(db, path); // system_ext sprintf(path, SYSEXT_POLICY_DIR "mapping/%s.cil", plat_ver); if (access(path, R_OK) == 0) load_cil(db, path); sprintf(path, SYSEXT_POLICY_DIR "mapping/%s.compat.cil", plat_ver); if (access(path, R_OK) == 0) load_cil(db, path); cil_file = SYSEXT_POLICY_DIR "system_ext_sepolicy.cil"; if (access(cil_file, R_OK) == 0) load_cil(db, cil_file); // product sprintf(path, PROD_POLICY_DIR "mapping/%s.cil", plat_ver); if (access(path, R_OK) == 0) load_cil(db, path); cil_file = PROD_POLICY_DIR "product_sepolicy.cil"; if (access(cil_file, R_OK) == 0) load_cil(db, cil_file); // vendor cil_file = VEND_POLICY_DIR "nonplat_sepolicy.cil"; if (access(cil_file, R_OK) == 0) load_cil(db, cil_file); cil_file = VEND_POLICY_DIR "plat_pub_versioned.cil"; if (access(cil_file, R_OK) == 0) load_cil(db, cil_file); cil_file = VEND_POLICY_DIR "vendor_sepolicy.cil"; if (access(cil_file, R_OK) == 0) load_cil(db, cil_file); // odm cil_file = ODM_POLICY_DIR "odm_sepolicy.cil"; if (access(cil_file, R_OK) == 0) load_cil(db, cil_file); if (cil_compile(db)) return nullptr; if (cil_build_policydb(db, &pdb)) return nullptr; auto sepol = new sepolicy(); sepol->db = &pdb->p; return sepol; } sepolicy *sepolicy::from_split() { const char *odm_pre = ODM_POLICY_DIR "precompiled_sepolicy"; const char *vend_pre = VEND_POLICY_DIR "precompiled_sepolicy"; if (access(odm_pre, R_OK) == 0 && check_precompiled(odm_pre)) return sepolicy::from_file(odm_pre); else if (access(vend_pre, R_OK) == 0 && check_precompiled(vend_pre)) return sepolicy::from_file(vend_pre); else return sepolicy::compile_split(); } sepolicy::~sepolicy() { policydb_destroy(db); free(db); } bool sepolicy::to_file(const char *file) { uint8_t *data; size_t len; /* No partial writes are allowed to /sys/fs/selinux/load, thus the reason why we * first dump everything into memory, then directly call write system call */ auto fp = make_stream_fp(data, len); run_finally fin([=]{ free(data); }); policy_file_t pf; policy_file_init(&pf); pf.type = PF_USE_STDIO; pf.fp = fp.get(); if (policydb_write(db, &pf)) { LOGE("Fail to create policy image\n"); return false; } int fd = xopen(file, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC, 0644); if (fd < 0) return false; xwrite(fd, data, len); close(fd); return true; }